Reversing
In our ‘Reversing’ section, we discover the inside of cybersecurity. Explore how we unravel the inner workings of software and systems to ensure maximum security.Learn advanced techniques and practical tips to strengthen your cyber defenses. Welcome to the world of Reversing at ZeroTrust
Fight Bugs | |
\\_V_//
\/=|=\/
[=v=]
__\___/_____
/..[ _____ ]
/_ [ [ M /] ]
/../.[ [ M /@] ]
<-->[_[ [M /@/] ]
/../ [.[ [ /@/ ] ]
_________________]\ /__/ [_[ [/@/ C] ]
<_________________>>0---] [=\ \@/ C / /
___ ___ ]/000o /__\ \ C / /
\ / /....\ \_/ /
....\||/.... [___/=\___/
. . . . [...] [...]
. .. . [___/ \___]
. 0 .. 0 . <---> <--->
/\/\. . . ./\/\ [..] [..]
/ / / .../| |\... \ \ \ _[__] [__]_
/ / / \/ \ \ \ [____> <____]
Introduction to assembly language
Learn the basic concepts necessary to analyze code in assembly language. Keep reading Introduction to assembly language
Basic Binary Analysis
Learn the procedure to perform basic binary analysis on Linux. Keep reading Basic Binary Analysis